Metasploitable Root shell 1524/tcp open shell Metasploitable root shell This was a curiousity… My first attempt was to attempt using rlogin to connect to the port, which did not appear to work correctly, though did seem to work enough to return part of a prompt to the user: root@kali:~# rlogin -p 1524 target oot@metasploitable:/# My next approach was to attempt a simple netcat connection to the host, which ended up being successful: root@kali:~# nc -v target 1524 root@metasploitable:/# id ...
LINUX BASIC COMMAND USED IN DAILY LIFE
- chroot Run a command with root privileges.
- dmesg Examine and control the kernel ring buffer.
- echo Send input string(s) to standard output i.e. display text on the screen.
- eject Eject removable media.
- exit Exit from the terminal.
- lsmod Show the status of modules in the Linux kernel.
- last Shows a list of recent logins on the system by fetching data from /var/log/wtmp file.
- less Displays contents of a file one page at a time. It’s advanced than more command.
- command to Show usb connected to Linux O.S
lsusb
- Command to show cpu information in Linux
lscpu
- Command to connect ssh(secure shell) remote login
ssh <user>@<ip of user>
- command to connect telnet and ftp server in Linux
telnet <ip of user>
ftp <ip of user>
- Command to show List Users in Linux
cat /etc/passwd
or
less /etc/passwd
or
getent passwd
- Command to show password in hash format in Linux
cat /etc/shadow
or
nano /etc/shadow
or
less /etc/shadow
nano /etc/shadow
less /etc/password
Written By Sanjay Kumar
Comments
Post a Comment